Skip to main content

Towards Net-Centric Cyber Survivability for Ballistic Missile Defense

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 6150)

Abstract

The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision—where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD) systems. We propose a net-centric architecture for augmenting the survivability of critical DoD net-centric systems. Our architecture draws inspiration from several theories of warfare, focusing on the goal of giving cyber commanders “decision superiority.” Our architecture prescribes a net-centric decision-support system that implements the Cyber OODA loop (the cycle of observing, orienting, deciding, and acting within the cyber domain). We present an illustration-of-concept prototype implementation, and describe its role in a ballistic-missile exercise. We relate our experiences from this exercise and suggest future directions towards achieving net-centric cyber survivability.

Keywords

  • Service Oriented Architecture
  • Ballistic Missile
  • Information Warfare
  • Guest Operating System
  • Human Decision Maker

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work is sponsored by the Department of Defense under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are not necessarily endorsed by the United States Government.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-13556-9_8
  • Chapter length: 17 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   74.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-13556-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority (1998)

    Google Scholar 

  2. VMware Technology Network Blog. Introducing VProbes: a stethoscope for your VM (June 2008), http://blogs.vmware.com/vmtn/2008/06/introducing-vpr.html

  3. Boyd, J.R.: A discourse on winning and losing. Maxwell Air Force Base, AL: Air University. Library Document No. M-U 43947, Briefing slides (1987)

    Google Scholar 

  4. Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: International Symposium on Fault-Tolerant Computing, FTCS (1978)

    Google Scholar 

  5. Coakley, T.: Decision superiority. Air & Space Power Journal (May 2001)

    Google Scholar 

  6. Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: USENIX Security Symposium (2003)

    Google Scholar 

  7. National Vulnerability Database. Vulnerability summary for CVE-2003-0244, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0244

  8. Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32–64 (1995)

    CrossRef  Google Scholar 

  9. Keromytis, A.D.: Characterizing self-healing software systems. In: Proceedings of the 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS) (2007)

    Google Scholar 

  10. MIT Lincoln Laboratory. Air and missle defense technology principal accomplishments (2008), http://www.ll.mit.edu/mission/airmissile/airmissileaccomplishments.html

  11. Lee, D., Lee, J., Lee, K.H.: A decision-support system to improve damage survivability of submarine. In: Hendtlass, T., Ali, M. (eds.) IEA/AIE 2002. LNCS (LNAI), vol. 2358, pp. 61–78. Springer, Heidelberg (2002)

    Google Scholar 

  12. Lipson, H.F., Fisher, D.A.: Survivability—a new technical and business perspective on security. In: NSPW 1999: Proceedings of the 1999 workshop on New security paradigms, pp. 33–39. ACM, New York (2000)

    CrossRef  Google Scholar 

  13. United States Department of Defense. The implementation of network-centric warfare. United States Government Printing Office (January 2005)

    Google Scholar 

  14. United States Department of Defense. FY2009–2034 Unmanned systems integrated roadmap (2009), http://www.acq.osd.mil/uas/

  15. United States Joint Chiefs of Staff. Joint publication 3-13: Information operations (February 2006), http://www.dtic.mil/doctrine

  16. United States National Institute of Standards (NIST). Guide to intrusion detection and prevention systems (IDPS) (Special publication 800-94) (February 2007)

    Google Scholar 

  17. Schwaegerl, C., Seifert, O., Buschmann, R., Dellwing, H., Geretshuber, S., Leick, C.: Increase of power system survivability with the decision support tool CRIPS based on network planning and simulation program PSS®SINCAL. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 119–130. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  18. Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a reactive immune system for software services. In: In Proceedings of the USENIX Annual Technical Conference, pp. 149–161 (2004)

    Google Scholar 

  19. United States. Information operations [electronic resource]. U.S. Air Force, Washington, D.C (2005)

    Google Scholar 

  20. Weimer, F.: Algorithmic complexity attacks and the linux networking code (May 2003), http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gagnon, M.N., Truelove, J., Kapadia, A., Haines, J., Huang, O. (2010). Towards Net-Centric Cyber Survivability for Ballistic Missile Defense. In: Giese, H. (eds) Architecting Critical Systems. ISARCS 2010. Lecture Notes in Computer Science, vol 6150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13556-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13556-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13555-2

  • Online ISBN: 978-3-642-13556-9

  • eBook Packages: Computer ScienceComputer Science (R0)